Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.
PIX code that seems to do the trick; comments in brackets are the bits the ASA turned its nose up at:-: crypto ipsec transform-set transet1 esp-des esp-md5-hmac crypto map outside_map 40 ipsec-isakmp dynamic dynmap crypto map outside_map interface outside isakmp identity address isakmp nat-traversal 20 isakmp policy 10 authentication pre-share isakmp policy 10 encryption des isakmp policy 10 hash md5 isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 vpngroup lestac address-pool vpnpool (vpngroup depricated) vpngroup lestac password secret (ditto) vpngroup lestac dns-server yserver1 (ditto) vpngroup lestac wins-server yserver1 (ditto) vpngroup lestac default-domain harlow (ditto) vpngroup lestac idle-time 1800 (ditto) ASA "bits" I tried to use to replace the "depricated" PIX bits to get the same effect:- tunnel-group lestac type ipsec-ra tunnel-group lestac general-attributes address-pool vpnpool tunnel-group lestac ipsec-attributes pre-shared-key secret default-group-policy lestac group-policy lestac attribues wins-server value 192.168.60.10 dns-server value 192.168.60.10 default-domain value harlow.local vpn-idle-timeout 1800 vpn-simultaneous-logins 10 vpn-tunnel-protocol IPSec
|Edgemax OS VPN, to Barracuda Link Balancer||7||88|
|SNMP v3 Encryption of encoded messages||3||32|
|Route all internet traffic through this VPN (sonicwall)||2||32|
|Palo Alto Networks - how to sync configs HA primary to secondary (active/passive)?||2||23|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
12 Experts available now in Live!